Work with System Values

Work with System Values allows you to maintain system values for Powertech Network Security. The system values for Log Journal Name, Log Journal Library, Log Message Queue Name, and Log Message Queue Library can be maintained anytime. Values for Product Owner, Product Library, and Product Administrator can only be maintained during installation or upgrade.

On the browser interface, these values can be found at Edit System Defaults.

Work with System Values panel

How to get there

To display these options, from the Network Security Main Menu, select option 81, Configuration Menu, then option 1, Work with System Values.

Field Descriptions

The following describes the parameters and allowable values for each field on the Work with System Values panel.

Product Owner

The product owner is the name of the user profile that owns all data objects and exit programs in the Powertech Network Security product.

Product Library

The product library is the library that contains all of the Powertech Network Security objects.

Product Administrator

The product administrator is the name of the user profile that owns administrative program objects in the Powertech Network Security product. We recommend granting administrators *USE authority to the PTADMIN authorization list using the following command, where myuser is the administrator profile to add.

ADDAUTLE AUTL(PTADMIN) USER(myuser) AUT(*USE)

NOTE: To access reporting functions, administrators must be authorized to the PTNSRPT authorization list.

For more information, see Granting Reporting Authority, later in this User Guide.

Once authorized to the PTADMIN and PTNSRPT authorization lists, the administrator has all the authorities needed to administer Powertech Network Security. Product administrators have *CHANGE authority to Network Security data and *USE authority to Network Security programs.

NOTE: Users set to the *SECOFR User Class do not need to be members of the PTADMIN or PTNSRPT authorizations lists to use Network Security or Network Security Reports.
Log Journal Name and Log Journal Library

The log journal name is the name of the journal that Powertech Network Security will log information. You can control the level of detail with the audit flag when you specify location and user authorities. Most installations will specify QUADJRN. The log journal library specifies the library where the log journal is located.

The Log Journal Library specifies the library where the log journal is located.

NOTE:
  1. You also can specify *NONE in the Log Journal Name field. However, if a journal name of *NONE is found in the Network Security system values, network transactions are not journaled.
  2. Some versions of Powertech Compliance Monitor expect Network Security audit entries to be written to QSYS/QAUDJRN. Contact Powertech technical support if you need further information concerning log journal entries.
Log Message Queue Name and Log Message Queue Library

The log message queue name is the name of the message queue where Powertech Network Security sends messages. Messages are sent to this queue when specified on location and user authority records. Most installations specify QSYSOPR.

The log message queue library is the library where the log message queue is located.

System Filter Rule Properties

The Work with System Values panel also allows you to specify system filter rule properties.

Authority

The authority assigned if no other authority is found for a server or function. Possible values are:

*OS400 Network Security allows the transaction without taking any action
*REJECT Network Security rejects requests for the transaction
*SWITCH Network Security switches the job to run as the user profile specified in the Switch Profile field.
Audit All Server Requests

Controls the type of requests Network Security will log. Network Security uses this value if no other value is entered for a server or function. Possible values are:

Y Log All requests
N Only log authority failures
Send Immediate Message

Determines if Network Security sends a message to the log message queue. Network Security uses this value if no other value is entered for a server or function. Possible values are:

Y A message is sent to the specified queue
N No message is sent
Capture Transactions

Capture transactions for Memorized Transaction Request (MTR). Network Security uses this value if no other value is entered for a server or function. Possible values are:

Y Capture transactions
N Do not capture transactions
Switch Profile

The name of a Switch Profile. If you enter a profile name, processing is switched to run as the specified profile and under this profile's authority. Network Security uses this value if no other value is entered for a server or function. Possible values are:

*NONE No switch profile is used.
switch-profile The switch profile to process under. The profile you specify must be an active profile on IBM i.
Last Change User/Date/Time

The user profile that changed the Network Security system values and the date and time the changes were made.

Command Keys

F3 (Exit): Exit the current panel without processing any pending changes.

F4 (Prompt): Displays a list of possible values from which you may select one.

F5 (Refresh): Refreshes the panel and resets all available text fields.

F7 (Select system): Use this command to work with data from a different System.

F12 (Cancel): Exit the current panel without processing any pending changes.

 

Copyright © HelpSystems, LLC.
All trademarks and registered trademarks are the property of their respective owners.
7.16 | 201712120915